Static task
static1
Behavioral task
behavioral1
Sample
1e55bfc02221fbd833166fe4e929495d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1e55bfc02221fbd833166fe4e929495d.exe
Resource
win10v2004-20231222-en
General
-
Target
1e55bfc02221fbd833166fe4e929495d
-
Size
2KB
-
MD5
1e55bfc02221fbd833166fe4e929495d
-
SHA1
b7e411e33ced46c3b34d1f988ab0e04444c4db8f
-
SHA256
129878f713768155e9623f3395aa7fbf8beeeffa5ecf5f3105723fd2dfe56c58
-
SHA512
bc9e4966f5e70894fd81412dea56293ecc6ce632797f0139ed3373dd1a663dd2ae3f5f2efa703773262f6794d82777fc82f46418ad6e063bd48a1d3bf603cf5c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e55bfc02221fbd833166fe4e929495d
Files
-
1e55bfc02221fbd833166fe4e929495d.exe windows:4 windows x86 arch:x86
1edb03896521a0514e6818fb7c1f2b36
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
OpenProcess
ExitProcess
WriteProcessMemory
GetCurrentProcessId
user32
GetWindowThreadProcessId
FindWindowA
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE